Preview

Vpn Solutions

Good Essays
Open Document
Open Document
571 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Vpn Solutions
Week 2 Discussion 1:
"VPN Solutions" Please respond to the following:
•Imagine you are a consultant called upon by a large U.S. corporation having more than 10,000 employees nationwide. You are asked to implement a VPN solution for remotely located employees to access the same corporate resources as they could from their desktops at work. Describe, in order, the types of questions you would ask their management and IT personnel in an information-gathering session before providing them a plan of work.

When implementing a VPN within an enterprise environment, security professions should begin with asking the following questions: * What is the purpose of implementing a VPN? * Is our goal to save money? To facilitate remote access? Or is it to link end users and/or branch offices together in order to increase efficiency and productivity? * What existing technologies and resources do we have available to expedite this process? * Will the virtual network encompass users outside of our company? * What traffic patterns and load can we expect on the virtual network? * Will users be allocated specific times to access resources? How will we ensure enough capacity to fulfill needs? * What types of application, hardware, and software will be used to access and manage connections for the VPN? * Will our existing IT department be able to handle the reconfiguration of embedded devices such as firewalls, virus scanners, and the like? * Who will manage and maintain the VPN? * Are the above all worthwhile causes to implement a VPN over a dedicated line?

Van der Horst, Jasper. " VPN Implementation: Questions to Ask and Points to Consider - Safe Passage | Roundup | PCMag.com." Technology Product Reviews, News, Prices & Downloads | PCMag.com | PC Magazine. N.p., 25 Sept. 2001. Web. 20 Apr. 2013. <http://www.pcmag.com/article2/0,2817,5442,00.asp>.

•Explain what is meant by “split

You May Also Find These Documents Helpful

  • Powerful Essays

    For the completion of this program, there are many aspects that need to be discussed and completed. Strategic planning, systems implementation, Network Security, training, Network maintenance, operational inputs and staffing will have to implemented.…

    • 1160 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Sdsa300 Unit 1

    • 178 Words
    • 1 Page

    Most would say VPN is the low-cost way to establish remote connections between offices and to securely provide connections to a mobile workforce. The central office should be equipped with a VPN concentrator that is configured to maintain the number of connections to be serviced for the mobile sales force. In order to provide complete network access to the mobile workforce the use of IPSec with L2TP, ESP, AH, using SHA-256, RSA2048 and AES256 is recommended over a UDP transport. Each branch office and the central office will require a point of presence to the Internet along with a local loop that provides enough bandwidth to accommodate the office demands. In order to keep cost to a minimum, it is recommended that SDSL be used at each branch…

    • 178 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Intended users: The users of the network will be 1 administrator, 2 full time employees and a receptionist.…

    • 768 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    For this assignment, imagine that you work for U.S. Industries, Inc. as a network administrator. Your…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    upgrade its IT infrastructure to ensure it is capable of handling the requirements of the…

    • 4187 Words
    • 22 Pages
    Powerful Essays
  • Better Essays

    You are the systems administrator contracted by Leonard Cooper to upgrade the local area network to meet the ever-increasing needs of the building's students and faculty members. Your first task is to interview key stakeholders to determine what the key areas of concern are.…

    • 1095 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    This model would support Role based access controls and allow mandatory access control to be governed by remote access. The IS Dept. is responsible for maintaining the access and access rights and prividgles and restricted as needed by user roles in the organization. All data is encrypted and transmitted via remote and encrypted and used by the vpn tunnel. VPN access will be terminated on a 3 month basis and must be renewed by revisiting based on your access role and…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 18

    • 490 Words
    • 3 Pages

    During the connection establishment process, the two computers involved in a VPN connection authenticate each other and select a VPN protocol.…

    • 490 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    To Use or Not to Use a Database? That is the Question. (2013). Retrieved from http://www.htmlgoodies.com/primers/database/article.php/3478121/To-Use-or-Not-to-Use-a-Database-That-is-the-Question.htm…

    • 972 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    NT 2580 Project Part 2

    • 2096 Words
    • 9 Pages

    Issue five. Because Richman hosts an internet for employees to access information about the company and enroll in company benefits programs, and because Richman also hosts an extranet for its business partners, you must research and devise a method to secured networks and communications. This should include the network structure,…

    • 2096 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Mism Phs Case Study

    • 610 Words
    • 3 Pages

    3. What are the operational IT/MIS challenges and benefits posed by the systems now in…

    • 610 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 3

    • 697 Words
    • 3 Pages

    Some employees are using the company networks to access the Internet. Some expect the company to provide this type of access. This presents a number of challenges to company network management. Identify three challenges and suggest strategies for a company to address these challenges.…

    • 697 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    1. What are some common risks, threats, and vulnerabilities commonly found in the LAN-to-WAN Domain that must be mitigated through a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Risk Management

    • 622 Words
    • 3 Pages

    Find a new proxy server to replace the IBM Infinity hardened served, hire a new in-house application developer. Must convert the Siemens Saturn series PBX telecommunications system with desktop phones to a VOIP system and enforce the current Acceptable Use Policy.…

    • 622 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Riordan Amended IT Budget

    • 1075 Words
    • 4 Pages

    The executive board for Riordan has tasked Information Technology with reducing their overall budget by two percent, while providing an increase of four percent to hardware line item, software line item, and outside IT support services. There are many lines within the budget that can be cut immediately to provide the necessary budget cuts, but it is important to make sure that none of the services being provided to staff will suffer with the adjustment to the budget. This paper will discuss the current budget, the increased made to the requested line items and the overall budget decrease. The paper will also justify the changes made to the budget.…

    • 1075 Words
    • 4 Pages
    Satisfactory Essays

Related Topics